HP Integrity rx1620 Installation Guide, Second Edition - HP Integrity rx1620 - Page 24

Removing and Replacing the Cover, Removing the Cover

Page 24 highlights

Installing and Configuring Removing and Replacing the Cover Removing and Replacing the Cover CAUTION Do not operate the server without the cover in place. Operation of the server without the cover in place will result in system failure. Operation of the server without the cover in place will make the server susceptible to EMI and overheating problems. Observe all ESD safety precautions before attempting this procedure. Failure to follow ESD safety precautions could result in damage to the server. Figure 3-9 Removing and Replacing the Cover OPEN CLOSED Intrusion sensor Removing the Cover To remove the cover, perform the following steps: 24 Chapter 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

Chapter 3
Installing and Configuring
Removing and Replacing the Cover
24
Removing and Replacing the Cover
CAUTION
Do not operate the server without the cover in place. Operation of the server without the cover
in place will result in system failure. Operation of the server without the cover in place will
make the server susceptible to EMI and overheating problems.
Observe all ESD safety precautions before attempting this procedure. Failure to follow ESD
safety precautions could result in damage to the server.
Figure 3-9
Removing and Replacing the Cover
Removing the Cover
To remove the cover, perform the following steps:
OPEN
CLOSED
Intrusion
sensor